masked-kyber-m4 / mkm4Links
This is the repository for the first-order masked Kyber on ARM Cortex-M4
☆13Updated last year
Alternatives and similar repositories for mkm4
Users that are interested in mkm4 are comparing it to the libraries listed below
Sorting:
- Masked implementations of PQ schemes for the Cortex-M4.☆9Updated 5 months ago
- MLKEM implementation optimized for embedded microcontrollers☆24Updated 11 months ago
- ☆11Updated last year
- ☆9Updated 5 years ago
- Provides common files for instances of mupq, e.g., for pqm4 and pqriscv☆12Updated 2 weeks ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- Saber and NTRU on M4 and AVX2☆17Updated 3 years ago
- Side-Channel Analysis Library☆94Updated last week
- ☆51Updated last year
- ☆19Updated 4 years ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆46Updated last year
- Secure AES128 Encryption Implementation for ATmega8515☆35Updated 4 years ago
- Security Estimation Scripts for Kyber and Dilithium☆39Updated 4 years ago
- Short proof-of-concepts for STM32 boards using a very minimal interface☆15Updated 7 years ago
- A pure python implementation of ML-DSA (FIPS 204) and CRYSTALS-Dilithium☆99Updated 3 months ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆61Updated 2 weeks ago
- Hardware implementation of Saber☆9Updated 5 years ago
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆46Updated last month
- A bitsliced implementation of ECB and CTR AES☆52Updated 11 months ago
- Post-quantum crypto library for the ARM Cortex-M4☆355Updated last week
- SABER is a Module-LWR based KEM submitted to NIST☆50Updated 3 years ago
- ☆11Updated 3 years ago
- ☆21Updated 2 weeks ago
- ☆55Updated last year
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆38Updated 2 years ago
- Secure, fast, and portable C90 implementation of ML-KEM / FIPS 203☆87Updated this week
- CryptoBib Database for Developers☆44Updated last month
- An Implementation of the Number Theoretic Transform☆48Updated last year
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆49Updated 6 years ago
- ☆12Updated last year